Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Biometric Data Keeps Captured Terrorists Behind Bars
American Forces Press Service ^ | Gerry Gilmore

Posted on 03/13/2006 4:14:23 PM PST by SandRat

WASHINGTON, March 13, 2006 – A high-tech Defense Department identification system has linked some captured terrorists to previous crimes and prevented their release from overseas detention facilities, senior defense officials said at a Senate Armed Services Committee hearing here March 10.

Click photo for screen-resolution image

A sample biometric ID card is checked at a stationary verification station during a DoD biometric identification system demonstration held in the Washington, D.C., area in May 2005. At the right is a fingerprint checker. Photo by Gerry J. Gilmore  

(Click photo for screen-resolution image);high-resolution image available.

"I understand that the (defense) department is collecting biometric information from individuals detained in Iraq and for forensic investigations of (improvised explosive device) attacks," Texas Sen. John Cornyn, chairman of the SASC's emerging threats and capabilities subcommittee, said to Paul McHale, assistant secretary of defense for homeland security.

"Consistent with applicable law, we are aggressively using biometrics for the purposes that you described, Senator," McHale answered. DoD established standard procedures for collecting biometrics information about a year and a half ago and provided that system to overseas U.S. combatant commands, McHale said.

Biometrics is defined as measurable physical or behavioral characteristics that can be used to identify people. Terrorists in Iraq often employ IEDs, or roadside bombs, against U.S., coalition, and Iraqi military forces and civilians.

Cornyn also asked McHale if DoD was sharing its detainee biometrics information with the U.S. Departments of Justice, State or Homeland Security, so that detainees who might escape could be prevented from entering the United States to do mischief.

McHale responded that DoD's detainee biometrics information databank is collocated with the FBI and is also shared with the Department of Homeland Security and other agencies.

The biometrics program used for identifying detainees "is an extraordinary success story," Army Lt. Gen. Joseph R. Inge, deputy commander of U.S. Northern Command and vice commander of North American Aerospace Defense Command's U.S. element, said.

In "many instances," the general said, that biometric data has kept dangerous detainees safely under lock and key.

"We have linked that data to specific individuals and in specific cases have kept them in custody under circumstances, where but for that biometric data, they might have been released," Inge said.

Similar systems are being used to improve force protection at U.S. military bases in Iraq. During a demonstration conducted in the Washington, D.C., area in May 2005, officials showed how biographical data, facial photographs, fingerprints and iris scans can be employed to develop ID cards that can't be counterfeited, ideal for use by Iraqis and other non-U.S. citizens who work on U.S. bases in Iraq.

The need for a better way to screen people coming onto U.S. bases in Iraq was illustrated by the Dec. 21, 2004, bombing of a military dining facility in Mosul. That blast killed 22 people, including 14 U.S. soldiers, and wounded at least 50. It was first thought the dining hall had been hit by a rocket attack.

Further investigation of the Mosul bombing pointed to the likelihood that a suicide bomber had infiltrated the base - one non-U.S. person killed couldn't be identified - and set off the explosion.



TOPICS: Foreign Affairs; War on Terror
KEYWORDS: applieddigital; bars; behind; biometric; captured; data; digitalangel; keeps; tagging; terrorists; verichip

1 posted on 03/13/2006 4:14:27 PM PST by SandRat
[ Post Reply | Private Reply | View Replies]

To: 2LT Radix jr; 68-69TonkinGulfYachtClub; 80 Square Miles; A Ruckus of Dogs; acad1228; AirForceMom; ..

Anyone want to guess how long it takes the ACLU/AmNasty International to cry; "Your Invading their Right to Privacy and Compelling them to Give Evidence in violation of their rights!!!"??????


2 posted on 03/13/2006 4:16:50 PM PST by SandRat (Duty, Honor, Country. What else needs to be said?)
[ Post Reply | Private Reply | To 1 | View Replies]

This is Applied Digital Solutions. They are the ones that came out with the chips being used for NAIS

More on NAIS:
http://www.freerepublic.com/focus/keyword?k=tagging

http://biometrics.cse.msu.edu/icprareareviewtalk.pdf


Biometrics: A Grand Challenge

Anil K. Jain, Sharath Pankanti, Salil Prabhakar,
Lin Hong, Arun Ross, and James L. Wayman
Michigan State University, IBM T. J. Watson Research Center, DigitalPersona Inc.,
Siemens Corporate Research, West Virginia University, San Jose State University
http://biometrics.cse.msu.edu

Person Identification
• Identifying fellow human beings has been crucial
to the fabric of human society
• In the early days of civilization, people lived in
small communities and everyone knew each other
• With the population growth and increase in
mobility, we started relying on documents and
secrets to establish identity
• Person identification is now an integral part of the
infrastructure needed for diverse business sectors
such as banking, border control, law enforcement..

Identification Problems
Security Threats:
We now live in a global society of increasingly desperate
and dangerous people whom we can no longer trust
based on identification documents which may have been
compromised
Senator? Terrorist? A Watch List Stops Kennedy at
Airport:
Senator Edward M. Kennedy, Democrat of Mass., discussed the problems faced by ordinary citizens mistakenly placed on terrorist watch lists. Between March 1 and April 6,
airline agents tried to block Mr. Kennedy from boarding airplanes on five occasions because his name resembled an alias used by a suspected terrorist who had been barred from flying on airlines in the United States.
RACHEL L. SWARNS,NY Times,Aug 20, 2004

Identification Problems
Identity Theft:
Identity thieves steal PIN (e.g., date of
birth) to open credit card accounts, withdraw money from
accounts and take out loans 3.3 million identity thefts in U.S. in 2002; 6.7 million victims of credit card fraud Surrogate representations of identity such as passwords and ID cards no longer suffice

Too Many Passwords to Remember!
• Heavy web users have an average of 21 passwords; 81% of users select a common password and 30% write their passwords down or store them in a file.
(2002 NTA Monitor Password Survey)

Biometrics
Automatic recognition of people based on their distinctive
anatomical (e.g., face, fingerprint, iris, retina, hand geometry) and behavioral (e.g., signature, gait) characteristics recognition of a person by their body, then linking that body to an externally established “identity”, forms a very powerful tool
John Smith

Biometric Functionalities
• Positive Identification
Is this person truly known to the system?
Provide log-in access to a valid user
• Large Scale Identification
Is this person in the database?
Prevent issuing multiple driver licenses to the same person
• Screening
Is this a wanted person?
Airport watch-list
Query image
(Vincent)
Template image
(Vincent)
Vincent
XG
Dennis
Ross
Silviu
Kim
Query image
Only biometrics can provide negative
identification (i.e., I am not he) capability


Biometrics: A Killer P.R. Application
• A Challenging Pattern Recognition Problem
• Enabling Technology to make our society safer,
reduce fraud and offer user convenience (user-
friendly man-machine interface)
• Policy-makers worldwide concede this is one of the
crucial components of reliable person identification
• Given its unique capability of identifying persons
based on their intrinsic characteristics, it will emerge
as a pervasive tool for personal identification

Biometrics: A Grand Challenge
“A fundamental problem in science and engineering with
broad economic and scientific Impact”
Accuracy
Scale
Usability
Unusable
Hard to Use
Easy to Use
Transparent to User
10
1
10
3
10
5
10
7
90%
99%
99.99%
99.999%
The grand challenge is to design a biometric system that
would operate on the extremes of all these three axes
simultaneously


As part of the enhanced procedures, most visitors traveling on visas will have two fingerprints scanned by an inkless device and a digital photograph taken. All of the
data and information is then used to assist the border inspector in determining whether or not to admit the traveler.
These enhanced procedures will add only seconds to the visitor’s overall processing time.
(DHS US-VISIT web-site)
The electronic fingerprint scanner will allow inspectors to
check identities of visitors against those on terrorist watch lists. (Stephen J. Boitano, AP)
There are 500 million border crossings/year (each way) in the U.S.

Want to Charge It?
Beepcard, a company in California, has designed a
credit card that works only when it recognizes the
voice of its rightful owner
Enclosed in the card is a tiny microphone, a loudspeaker and a speech recognition chip that compares the spoken password with a recorded sample.
Total credit card fraud amounts to billions of dollars every year


Point of sale
Secure multimedia

Biometric Applications
Disney World
Haj pilgrims in Saudi Arabia
URL at your fingertip
Mobile phone
Iris-based ATM
Sharbat Gula in 1985, 1992


Biometrics is Not New!
• Bertillon system (1882) took subject's photograph, and recorded height, the length of one foot, an arm and index finger
• Galton/Henry system of fingerprint classification adopted by Scotland Yard in 1900
• FBI set up a fingerprint identification division in 1924
• AFIS installed in 1965 with a database of 810,000 fingerprints
• First face recognition paper published in 1971 (Goldstein et al.)
• FBI installed IAFIS in 2000 with a database of 47 million 10 prints; average of 50,000 searches per day; 15% of searches are in lights out mode. 2 hour response time for criminal search
Emphasis now is to automatically perform reliable person
identification in unattended mode, often remotely (or at a distance)



Biometric Market Growth
International Biometric Group

Why is Biometrics so Difficult?
• Intra-class variability and inter-class similarity
• Segmentation
• Noisy input & population coverage
• System performance (error rate, speed, cost)
• Individuality of biometric characteristics
• Fusion of multiple biometric attributes
• Scalability
• Attacks on the biometric system
• Privacy Issues


Intra-class and Inter-class Variations
Variability observed in the face image of a single person due to change in pose, expression, lighting and eye glasses
Faces that look similar
R.-L. Hsu, “Face Detection and Modeling for Recognition”, Ph.D. Thesis, 2002

Recognizing the Smile
Home Office prohibits happy biometric passports
• The Home Office says all new passport photographs must be of an unsmiling face with its gob firmly shut because open mouths can confuse facial recognition systems.
• The new guidelines state that photographs must have a strong definition between the face and background; be of the full face facing straight at the camera; show no shadows, and that subjects must have "a neutral expression, with your mouth closed".
• A Sun report confidently tells its readers that "immigration Service officials will run the passport through scanners which will cross-check them against worldwide crime memory banks" and that "the 'biometric' tests ensure that people cannot use stolen or fake documents".
- Lucy Sherriff, The Register, Aug. 6, 2004


Sensor Interoperability
• Sensors used during enrollment and verification may be different

Noisy Images
• 3
poor quality fingerprint images
Four impressions of a user’s fingerprint


Segmentation: Face Detection
*Theo Pavlidis, http://home.att.net/t.pavlidis/comphumans/comphuman.htm


“State-of-the-art” Error Rates
Test
Test
Parameter
False
Reject Rate
False
Accept Rate
Fingerprint
FVC
[2004]
20 years
(average age)
2%
2%
Face
FRVT
[2002]
Varied lighting,
outdoor/indoor
10%
1%
Voice
NIST
[2000]
Text
Independent
10-20%
2-5%
At NY airports, an average of 200,000 passengers pass through daily. If all of these used biometric-authenticated smart cards for identification, there would be 4000 falsely rejected (and inconvenienced) passengers per day for fingerprints, 20,000 for face and 30,000 for voice. Similar
numbers can be computed for false accepts

FVC 2004 Results
Algoritm EER (%)
Avg Enroll
Time (sec)
Avg
Match
Time
(sec)
Avg Model
Size (KB)
Bioscrypt
Inc.
2.07
0.08
1.48
2.07
0.67
0.71
1.19
24
Sonda Ltd
2.10
2.07
1.3
Chinese Academy of Sciences
2.30
0.35
16.4
Gevarius
2.45
0.69
2.0
Jan Lunter
2.90
1.01
3.1
• Database:
– DB1: optical sensor "V300" by CrossMatch
– DB2: optical sensor "U.are.U 4000" by Digital Persona
– DB3: thermal sweeping sensor "FingerChip FCD4B14CB" by Atmel
– DB4: synthetic fingerprints


Typical Intrinsic Matcher (1:1)
Performance Requirements
Typical Intrinsic Matcher (1:1)
Performance Requirements
Functionality
FNMR %
FMR %
Authentication
0.1
0.1
Large Scale
Identification
10.0
0.0001
Screening
1.0
0.0001
It is assumed that large-scale identification consists of 1 million identities and screening involves 500 identities. FTA and FTE are assumed to be zero. These numbers are based on what the authors believe to be the order of magnitude
estimate of the performance needed for viability of a typical application.


• Given an input fingerprint with n minutiae, compute the
probability that it will share q minutiae with any other
template fingerprint containing m minutiae, p(M, m, n, q).
The corresponding minutiae should “match” in location and


Individuality of Fingerprints orientation.
(C)
(A)
(a) M=52
m=n=q=26
P = 2.40 x 10
-30
(b) M=52
m=n=26, q=10
P = 5.49 x 10
-4
*Pankanti, Prabhakar, Jain, "On the Individuality of Fingerprints", IEEE Transactions on
PAMI, Vol. 24, No. 8, pp. 1010-1025, 2002.


Multibiometrics

Limited discrimination and non-universality of a biometric
Face
Hand
geometry
Fingerprint
Helps improve accuracy and population coverage
Page 29
Fusing Face & Fingerprint Systems
Fusing Face & Fingerprint Systems
Min-Max
Normalization of
matching scores
Sum Rule
1000 Subjects
EER is reduced from 3% for the best individual matcher to <1% for multimodal system



Soft Biometrics
Eye color
Gender, Skin Color, Hair color
Height
http://ology.amnh.org/genetics/longdefinition/index3.html
© American Museum of Natural History, 2001
http://anthro.palomar.edu/adapt/adapt_4.htm
© Corel Corporation, Ottawa, Canada
http://www.altonweb.com/history/wadlow/p2.html
© Alton Museum of History and Art
http://www.laurel-and-hardy.com/
goodies/home6.html © CCA
Weight


Identification at a Distance
Height: 5.9 ft.
Eye color: black
Gender: Male
Ethnicity: Asian
Face: LDA Coefficients
Identity: Unsang

Scalability of Biometric Systems
• How does the number of identities in the database affect the
speed and accuracy of the system?
• Few published studies on reliable indexing of biometric patterns

Fingerprint Classification

• Assign fingerprints into one of pre-specified types (coarse
classification for indexing);
• Best 4-class performance is only 95%
Plain Arch
Tented Arch
Right Loop
Left Loop
Plain Whorl
Accidental
Pocket Whorl
Double Loop


Vulnerability of a Biometric System
Like any system, biometric systems can be attacked in different ways
Ratha et al., An Analysis of Minutiae Strength, AVBPA 2001
Fake Biometric
Replay old data
Override feature extractor
Synthesized feature vector
Override matcher
Modify template
Intercept the channel
Override final decision
Liveness detection


Template Protection
• Encrypting or watermarking templates in the database
• Storing only a transformed and unrecoverable version of a
user’s template to protect the original template
• Cancelable biometric
Jain,Uludag, Hsu, "Hiding a Face in a Fingerprint Image", Proc. of ICPR, Aug., 2002
Ratha, Connell, Bolle, “Enhancing security and privacy in biometrics-based authentication systems”, IBM Systems Journal, vol. 40,
no. 3, 2001, pp. 614-634.
©
Ratha, Connell, Bolle (IBM)


Biometric Enabled Smart Card
• Template resides in the personal smart card of a user
• Verification takes place via a built-in chip on the card
• Template does not leave the card; no centralized biometric
database is required
Siemens Matcher on Card
Version 1.1
Precise Biometrics
5th
Sense from Veridicom

Privacy Concerns
• Biometric can help in protecting individual privacy; because biometrics provides stronger identification than password, it can be used to guard personal & sensitive information (Health Information Privacy Protection Act)
• Will biometric data be used to track people (secretly) violating their right to privacy?
• Functionality creep: Will biometric data be used only for their intended purpose? Will various biometric databases be “linked”?


Religious/Cultural Objections
© Orlando Sentinel
This is no different than acceptance of some other technologies

Summary

• Reliable and automatic person identification is becoming
a necessity; emerging applications include national ID
card, border crossing, access control Internet shopping,
and computer data security
• There is no substitute to biometrics for effective person
identification; it is becoming a necessary component of
any ID management system
• Biometric sensors are cheap; fingerprint, face and voice
sensors are available in laptops & mobile phones
• But, biometric system performance is not meeting the
expectations

Summary
• Research is needed in (i) new representations, (ii)
matching algorithms, (iii) database indexing, (iv)
fusion of biometric modalities, (v) liveness detection,
(vi) template protection, (vi) error rate estimation
• Need more system testing and evaluation on large
standardized databases
• Biometrics has great potential to improve our privacy,
but government regulations are needed
• No security system, including biometric system, is
foolproof
• Need cost/benefit analysis for the deployment of
biometric systems; quantifying deterrence has proved
extremely difficult

Future Directions
• User Adaptation
– Observing how the user interacts with the biometric device (e.g., user approaching a hand geometry device)
• Soft Biometrics
– Utilize soft biometric traits like color of eye, color of hair, gender to reinforce identity
• Tracking
– Monitor user behavior over an entire session (e.g., not just at login time) in order to validate identity



Applied Digital Solutions new "Verichip" about the size
of a grain of rice, is the first-ever computer ID chip,
that could be embedded beneath a persons skin.
Yahoo! News 27 Feb ’02

Verichip
(AP Photo/Applied Digital Solutions)


3 posted on 03/13/2006 7:20:54 PM PST by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 1 | View Replies]

So is this data collection for 'security' going to be in our federal DOD databases? Or does it go into the GLOBAL database that comes with the Chip subscriptions like NAIS?



The animal tagging is being mandated on us from the NGOs.

The CFRs from the NGO grant monies makes everything the monies touch, theirs.

All the data collected from tagging and premise registration goes into the GLOBAL database.

Here is the companies press release.

GLOBAL VERICHIP SUBSCRIBER (GVS) REGISTRY READY FOR FIRST-EVER VERICHIP "CHIPPING" PROCEDURE ON MAY 10TH AND LAUNCH OF VERICHIP INTO U.S. MARKET

Secure database and 24/7 operations center will support VeriChip subscribers, affiliates and authorized centers.

PALM BEACH, FL �May 2, 2002 -- Applied Digital Solutions, Inc. (Nasdaq: ADSX), an advanced technology development company, announced today that its Global VeriChip Subscriber (GVS) Registry service is ready for the first-ever VeriChip "chipping" procedure on May 10, 2002 and VeriChip's official market launch in the United States.

The GVS Registry service, first announced April 9, 2002, supports VeriChip subscribers, authorized VeriChip centers and VeriChip System Affiliates (such as hospitals, EMTs, search and rescue units, and urgent care clinics) by providing immediate access to vital subscriber information in an emergency.

Full-scale marketplace operation of the GVS Registry service will begin with the historic Jacobs family "chipping" procedure on May 10, 2002. The procedure will be followed by a press conference and an invitation-only brunch for business partners and community leaders.

During the press conference and the business brunch, Applied Digital executives will unveil more details about VeriChip's rollout plans.

VeriChip is a miniaturized, implantable, radio frequency identification device (RFID) that can be used in a variety of security, emergency and healthcare applications. About the size of a grain of rice, each VeriChip is composed of FDA-accepted materials and contains a unique verification number that can seamlessly integrate to the GVS Registry via a proprietary VeriChip scanner. Instant access to such vital information as allergies to medications, medical device implants, pre-existing medical conditions and emergency contact numbers could save lives in an emergency and enhance the peace of mind of subscribers and their loved ones.

The new GVS Registry Service is hosted and maintained by Digital Angel Corporation's (Amex: DOC) state-of-the-art, FDA-compliant operations centers in Riverside, California and Owings, Maryland. Complementary, 24/7 call-center services are provided by a physician-supervised staff of support associates in Owings, Maryland.

The GVS Registry service will initially support VeriChip subscribers in South Florida who will be "chipped" during the company's initial product rollout beginning with the Jacobs family on May 10, 2002.

Performed under the supervision of the company's first Authorized VeriChip Center in Palm Beach County, the rollout will feature the use of the first ChipMobile� � a state of the art, medically equipped mobile unit that will deliver VeriChip to initial target markets such as elder care centers, critical care facilities and Generation Y events. The Palm Beach County rollout will last until June 30, 2002, at which time the company expects to move into other geographic markets and initiate nationwide distributor alliance programs.

Commenting on this announcement, Scott R. Silverman, President of Applied Digital Solutions, said: "As promised, the GVS Registry is now fully operational and is prepared to securely house subscriber information so it can be accessed by Authorized VeriChip Affiliates such as hospitals and EMS units. We're confident the GVS Registry's secure software and database will integrate seamlessly with the VeriChip product and proprietary scanners to provide our subscribers with instant access to potentially life-saving, accurate, complete emergency healthcare information stored in the Registry."

About VeriChip� VeriChip, first announced on December 19, 2001, is a miniaturized, implantable, radio frequency identification device (RFID) that can be used in a variety of security, emergency and healthcare applications.

On April 4, 2002, the company announced that it had received written guidance that the U.S. Food and Drug Administration (FDA) does not consider VeriChip's personal verification device to be a regulated medical device, enabling the company to begin sales, marketing and distribution of VeriChip in the United States. About the size of a grain of rice, each VeriChip is composed of FDA-accepted materials and contains a unique verification number. That number is captured by briefly passing a proprietary, external scanner over the VeriChip. A small amount of radio frequency energy passes through the skin energizing the dormant VeriChip, which then emits a radio frequency signal transmitting the verification number. The company believes its first-mover advantage will enable it to gain significant market share in the emergency information and verification market that is estimated to exceed $15 billion. VeriChip Corporation is a wholly owned subsidiary of Applied Digital Solutions.

About Digital Angel Corporation Digital Angel Corporation (Amex: DOC) was formed on March 27, 2002, in a merger between Digital Angel Corporation and Medical Advisory Systems, a global leader in telemedicine that has operated a 24/7, physician-staffed call center in Owings, Maryland, for two decades.

Prior to the merger, Digital Angel Corporation was a wholly owned subsidiary of Applied Digital Solutions. Applied Digital Solutions is the beneficial owner of 19.6 million shares of Digital Angel Corporation. Digital Angel� technology represents the first-ever combination of advanced biosensors and Web-enabled wireless telecommunications linked to the Global Positioning System (GPS). By utilizing advanced biosensor capabilities, Digital Angel will be able to monitor key body functions � such as temperature and pulse � and transmit that data, along with accurate emergency location information, to a ground station or monitoring facility. For more information about Digital Angel, visit www.digitalangel.net.

About Applied Digital Solutions Applied Digital Solutions (Nasdaq: ADSX) is an advanced technology development company that focuses on a range of early warning alert, miniaturized power sources and security monitoring systems combined with the comprehensive data management services required to support them. Through its Advanced Technology Group, the company specializes in security-related data collection, value-added data intelligence and complex data delivery systems for a wide variety of end users including commercial operations, government agencies and consumers.

For more information, visit the company's website at http://www.adsx.com.

Statements about the Company's future expectations, including future revenues and earnings, and all other statements in this press release other than historical facts are "forward-looking statements" within the meaning of Section 27A of the Securities Act of 1933, Section 21E of the Securities Exchange Act of 1934, and as that term is defined in the Private Litigation Reform Act of 1995. Such forward-looking statements involve risks and uncertainties and are subject to change at any time, and the Company's actual results could differ materially from expected results. The Company undertakes no obligation to update forward-looking statements to reflect subsequently occurring events or circumstances.

Investor Contact---------------------------Media Contact Lynn Anderson-------------------------Matthew Cossolotto Phone: 561-805-8007------------------Phone: 914-245-9721

4 posted on 03/13/2006 7:23:51 PM PST by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Grinder; freepatriot32; prairiebreeze; tiamat; Ladysmith; Alas Babylon!; Malacoda; vrwc0915; ...

On to the human tagging!


5 posted on 03/13/2006 7:24:26 PM PST by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 4 | View Replies]

To: RedBloodedAmerican

ping


6 posted on 03/13/2006 7:26:10 PM PST by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gabz

ping


7 posted on 03/13/2006 7:29:50 PM PST by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 5 | View Replies]

To: SandRat
They should be collecting DNA from inside the female organs of camels and goats.

Why are camels called the "Ships of the Desert"????

Because they are full of Iranian Sea men.

8 posted on 03/13/2006 7:30:04 PM PST by HP8753 (My cat loves watching "When Animals Attack")
[ Post Reply | Private Reply | To 1 | View Replies]

They are already cashing in on the Pay to Play contracts at the WTC with this

http://www.freerepublic.com/focus/f-news/1585686/posts
Smart Cameras, Armed Guards to Protect WTC


9 posted on 03/13/2006 7:33:25 PM PST by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Calpernia

For the morning mark.

Thanks!


10 posted on 03/13/2006 7:34:47 PM PST by Gabz (Smokers are the beta version)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Calpernia
On to the human tagging!

Sometimes the old ways are the best ways.

11 posted on 03/13/2006 7:44:25 PM PST by prairiebreeze (Dear Congressmoron.....)
[ Post Reply | Private Reply | To 5 | View Replies]

To: prairiebreeze

This scares me! Our security data will be in a Global third party database?

Something ain't right!


12 posted on 03/13/2006 7:45:26 PM PST by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 11 | View Replies]

To: SandRat

BTTT


13 posted on 03/14/2006 3:07:05 AM PST by E.G.C.
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson